442
442
texts
eye 442
favorite 0
comment 0
Topics: Tamanka, Gobiidae, Pisces, fishes, new species, identification key, Philippines, China
Closed captions transcript: 00:00:00 Sharing of data and scientific knowledge in the fight against covered 19 Ted rolls 00:00:05 out and. Is the w 00:00:08 h O's director today we are joining $77.00 countries and no matter as part of the 00:00:14 notice to launch the copy of $9000.00 technology access full or see top Costa 00:00:21 Rica's president Carlos Alvarado outlined 00:00:24 a worldwide technology repository for vaccines medicines and diagnostics it seeks 00:00:31 to boost solidarity and...
Topic: Radio Program
151
151
Nov 9, 2011
11/11
by
Thomas Davidson
texts
eye 151
favorite 0
comment 0
Topics: Brachiopoda, Devonian, China, RHYNCHONELLA
12
12
Jan 11, 2020
01/20
by
Vaidhyanathan, Siva
texts
eye 12
favorite 0
comment 0
xiv, 265 p. ; 24 cm
Topics: Google (Firm), Internet industry -- Social aspects, Internet -- Social aspects, Google Inc,...
Source: removedNEL
3
3.0
Jun 29, 2018
06/18
by
Orion Afisiadis; Andrew C. M. Austin; Alexios Balatsoukas-Stimming; Andreas Burg
texts
eye 3
favorite 0
comment 0
In a cognitive radio system the failure of secondary user (SU) transceivers to promptly vacate the channel can introduce significant access-latency for primary or high-priority users (PU). In conventional cognitive radio systems, the backoff latency is exacerbated by frame structures that only allow sensing at periodic intervals. Concurrent transmission and sensing using self-interference suppression has been suggested to improve the performance of cognitive radio systems, allowing decisions to...
Topics: Information Theory, Computing Research Repository, Mathematics
Source: http://arxiv.org/abs/1609.01139
4
4.0
Jun 27, 2018
06/18
by
Praneeth Kumar; Srikrishna Bhashyam
texts
eye 4
favorite 0
comment 0
In this paper, we analyze the Gaussian X channel in the mixed interference regime. In this regime, multiple access transmission to one of the receivers is shown to be close to optimal in terms of sum rate. Three upper bounds are derived for the sum capacity in the mixed interference regime, and the subregions where each of these bounds dominate the others are identified. The genie-aided sum capacity upper bounds derived also show that the gap between sum capacity and the sum rate of the...
Topics: Information Theory, Computing Research Repository, Mathematics
Source: http://arxiv.org/abs/1505.06317
2
2.0
Jun 30, 2018
06/18
by
Daniel Karapetyan; Andrei Gagarin; Gregory Gutin
texts
eye 2
favorite 0
comment 0
The workflow satisfiability problem (WSP) asks whether there exists an assignment of authorised users to the steps in a workflow specification, subject to certain constraints on the assignment. (Such an assignment is called valid.) The problem is NP-hard even when restricted to the large class of user-independent constraints. Since the number of steps $k$ is relatively small in practice, it is natural to consider a parametrisation of the WSP by $k$. We propose a new fixed-parameter algorithm to...
Topics: Data Structures and Algorithms, Computing Research Repository
Source: http://arxiv.org/abs/1412.7834
2
2.0
Jun 29, 2018
06/18
by
Bai Liu; Ke Han; Jianming Hu
texts
eye 2
favorite 0
comment 0
Variable message sign (VMS) is an effective traffic management tool for congestion mitigation. The VMS is primarily used as a means of providing factual travel information or genuine route guidance to travelers. However, this may be rendered sub-optimal on a network level by potential network paradoxes and lack of consideration for its cascading effect on the rest of the network. This paper focuses on the design of optimal display strategy of VMS in response to real-time traffic information and...
Topics: Optimization and Control, Networking and Internet Architecture, Computing Research Repository,...
Source: http://arxiv.org/abs/1611.08343
2
2.0
Jun 29, 2018
06/18
by
Alexander Barg; Itzhak Tamo; Serge Vladuts
texts
eye 2
favorite 0
comment 0
A code over a finite alphabet is called locally recoverable (LRC code) if every symbol in the encoding is a function of a small number (at most $r$) other symbols of the codeword. In this paper we introduce a construction of LRC codes on algebraic curves, extending a recent construction of Reed-Solomon like codes with locality. We treat the following situations: local recovery of a single erasure, local recovery of multiple erasures, and codes with several disjoint recovery sets for every...
Topics: Information Theory, Computing Research Repository, Mathematics
Source: http://arxiv.org/abs/1603.08876
3
3.0
Jun 29, 2018
06/18
by
Zhixuan Fang; Longbo Huang; Adam Wierman
texts
eye 3
favorite 0
comment 0
The growth of the sharing economy is driven by the emergence of sharing platforms, e.g., Uber and Lyft, that match owners looking to share their resources with customers looking to rent them. The design of such platforms is a complex mixture of economics and engineering, and how to "optimally" design such platforms is still an open problem. In this paper, we focus on the design of prices and subsidies in sharing platforms. Our results provide insights into the tradeoff between revenue...
Topics: Computing Research Repository, Computer Science and Game Theory
Source: http://arxiv.org/abs/1604.01627
2
2.0
Jun 30, 2018
06/18
by
Peng Xia; Kun Tu; Bruno Ribeiro; Hua Jiang; Xiaodong Wang; Cindy Chen; Benyuan Liu; Don Towsley
texts
eye 2
favorite 0
comment 0
Online dating sites have become popular platforms for people to look for potential romantic partners. It is important to understand users' dating preferences in order to make better recommendations on potential dates. The message sending and replying actions of a user are strong indicators for what he/she is looking for in a potential date and reflect the user's actual dating preferences. We study how users' online dating behaviors correlate with various user attributes using a large real-world...
Topics: Physics, Systems and Control, Computing Research Repository, Physics and Society, Social and...
Source: http://arxiv.org/abs/1401.5710
3
3.0
Jun 30, 2018
06/18
by
Gunnar Carlsson; Facundo Mémoli; Alejandro Ribeiro; Santiago Segarra
texts
eye 3
favorite 0
comment 0
This paper introduces hierarchical quasi-clustering methods, a generalization of hierarchical clustering for asymmetric networks where the output structure preserves the asymmetry of the input data. We show that this output structure is equivalent to a finite quasi-ultrametric space and study admissibility with respect to two desirable properties. We prove that a modified version of single linkage is the only admissible quasi-clustering method. Moreover, we show stability of the proposed method...
Topics: Machine Learning, Computing Research Repository, Statistics, Learning
Source: http://arxiv.org/abs/1404.4655
2
2.0
Jun 30, 2018
06/18
by
Zhen Zhu; Federica Cerina; Alessandro Chessa; Guido Caldarelli; Massimo Riccaboni
texts
eye 2
favorite 0
comment 0
Theory of complex networks proved successful in the description of a variety of static networks ranging from biology to computer and social sciences and to economics and finance. Here we use network models to describe the evolution of a particular economic system, namely the International Trade Network (ITN). Previous studies often assume that globalization and regionalization in international trade are contradictory to each other. We re-examine the relationship between globalization and...
Topics: Physics, Physics and Society, Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1404.6950
2
2.0
Jun 30, 2018
06/18
by
Zhensong Qian; Oliver Schulte; Yan Sun
texts
eye 2
favorite 0
comment 0
Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of {\em positive and negative} relationships. With a naive enumeration approach, computing sufficient statistics for negative relationships is feasible only for small databases. We solve this problem with a new...
Topics: Databases, Computing Research Repository, Learning
Source: http://arxiv.org/abs/1408.5389
2
2.0
Jun 30, 2018
06/18
by
Yuyu Zhang; Liang Pang; Lei Shi; Bin Wang
texts
eye 2
favorite 0
comment 0
This paper describes the solution of Bazinga Team for Tmall Recommendation Prize 2014. With real-world user action data provided by Tmall, one of the largest B2C online retail platforms in China, this competition requires to predict future user purchases on Tmall website. Predictions are judged on F1Score, which considers both precision and recall for fair evaluation. The data set provided by Tmall contains more than half billion action records from over ten million distinct users. Such massive...
Topics: Computing Research Repository, Learning
Source: http://arxiv.org/abs/1408.6515
4
4.0
Jun 30, 2018
06/18
by
Andrea Del Prete; Francesco Romano; Lorenzo Natale; Giorgio Metta; Giulio Sandini; Francesco Nori
texts
eye 4
favorite 0
comment 0
This paper presents a new technique to control highly redundant mechanical systems, such as humanoid robots. We take inspiration from two approaches. Prioritized control is a widespread multi-task technique in robotics and animation: tasks have strict priorities and they are satisfied only as long as they do not conflict with any higher-priority task. Optimal control instead formulates an optimization problem whose solution is either a feedback control policy or a feedforward trajectory of...
Topics: Robotics, Computing Research Repository
Source: http://arxiv.org/abs/1410.4414
3
3.0
Jun 28, 2018
06/18
by
Huijing Zhang; David Choffnes
texts
eye 3
favorite 0
comment 0
Mobile devices that connect to the Internet via cellular networks are rapidly becoming the primary medium for accessing Web content. Cellular service providers (CSPs) commonly deploy Web proxies and other middleboxes for security, performance optimization and traffic engineering reasons. However, the prevalence and policies of these Web proxies are generally opaque to users and difficult to measure without privileged access to devices and servers. In this paper, we present a methodology to...
Topics: Cryptography and Security, Networking and Internet Architecture, Computing Research Repository
Source: http://arxiv.org/abs/1511.04493
65
65
Nov 8, 2010
11/10
by
Bleeker, Sonia
texts
eye 65
favorite 2
comment 0
Manuscript and two galley proofs of this author's 1966 children's book "The Ashanti of Ghana."
Topic: Ashanti (African people)
136
136
texts
eye 136
favorite 0
comment 0
Topics: Rhino Ratsnake, Rhynchophis boulengeri
3
3.0
Jun 30, 2018
06/18
by
Tianlang Chen; Yuxiao Chen; Jiebo Luo
texts
eye 3
favorite 0
comment 0
Selfies have become increasingly fashionable in the social media era. People are willing to share their selfies in various social media platforms such as Facebook, Instagram and Flicker. The popularity of selfie have caught researchers' attention, especially psychologists. In computer vision and machine learning areas, little attention has been paid to this phenomenon as a valuable data source. In this paper, we focus on exploring the deeper personal patterns behind people's different kinds of...
Topics: Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1702.08097
2
2.0
Jun 30, 2018
06/18
by
Dominik Wurzer; Yumeng Qin
texts
eye 2
favorite 0
comment 0
Newswire and Social Media are the major sources of information in our time. While the topical demographic of Western Media was subjects of studies in the past, less is known about Chinese Media. In this paper, we apply event detection and tracking technology to examine the information overlap and differences between Chinese and Western - Traditional Media and Social Media. Our experiments reveal a biased interest of China towards the West, which becomes particularly apparent when comparing the...
Topics: Information Retrieval, Computing Research Repository
Source: http://arxiv.org/abs/1701.01737
2
2.0
Jun 28, 2018
06/18
by
Jun Zhu; Ning Wang; Vijay K. Bhargava
texts
eye 2
favorite 0
comment 0
Secure transmission in large-scale MISO systems employing artificial noise (AN) is studied under the per-antenna constant envelope (CE) constraint. Achievable secrecy rate of the per-antenna CE precoding scheme for large-scale MISO is analyzed and compared with that of the matched filter linear precoding. A two-stage per-antenna CE precoding scheme for joint signal-plus-AN transmission is proposed. The first stage determines the per-antenna CE precoding for the information-bearing signal. A...
Topics: Information Theory, Computing Research Repository, Mathematics
Source: http://arxiv.org/abs/1510.02894
2
2.0
Jun 30, 2018
06/18
by
Suejb Memeti; Sabri Pllana
texts
eye 2
favorite 0
comment 0
Regular expression matching is essential for many applications, such as finding patterns in text, exploring substrings in large DNA sequences, or lexical analysis. However, sequential regular expression matching may be time-prohibitive for large problem sizes. In this paper, we describe a novel algorithm for parallel regular expression matching via deterministic finite automata. Furthermore, we present our tool PaREM that accepts regular expressions and finite automata as input and...
Topics: Distributed, Parallel, and Cluster Computing, Computing Research Repository, Formal Languages and...
Source: http://arxiv.org/abs/1412.1741
2
2.0
Jun 30, 2018
06/18
by
Qipeng Liu; Jiuhua Zhao; Xiaofan Wang
texts
eye 2
favorite 0
comment 0
In this paper, we discuss a class of distributed detection algorithms which can be viewed as implementations of Bayes' law in distributed settings. Some of the algorithms are proposed in the literature most recently, and others are first developed in this paper. The common feature of these algorithms is that they all combine (i) certain kinds of consensus protocols with (ii) Bayesian updates. They are different mainly in the aspect of the type of consensus protocol and the order of the two...
Topics: Physics, Data Analysis, Statistics and Probability, Statistics, Computing Research Repository,...
Source: http://arxiv.org/abs/1412.6049
4
4.0
Jun 28, 2018
06/18
by
Daniel Augot; Françoise Levy-Dit-Vehel; Man Cuong Ngô
texts
eye 4
favorite 0
comment 0
We here provide a method for systematic encoding of the Multiplicity codes introduced by Kopparty, Saraf and Yekhanin in 2011. The construction is built on an idea of Kop-party. We properly define information sets for these codes and give detailed proofs of the validity of Kopparty's construction, that use generating functions. We also give a complexity estimate of the associated encoding algorithm.
Topics: Information Theory, Computational Complexity, Computing Research Repository, Mathematics,...
Source: http://arxiv.org/abs/1509.00279
9
9.0
Jun 28, 2018
06/18
by
Yu Wang; Jianbo Yuan; Jiebo Luo
texts
eye 9
favorite 0
comment 0
China has experienced a spectacular economic growth in recent decades. Its economy grew more than 48 times from 1980 to 2013. How are the other countries reacting to China's rise? Do they see it as an economic opportunity or a security threat? In this paper, we answer this question by analyzing online news reports about China published in Australia, France, Germany, Japan, Russia, South Korea, the UK and the US. More specifically, we first analyze the frequency with which China has appeared in...
Topics: Computing Research Repository, Computers and Society
Source: http://arxiv.org/abs/1509.02596
2
2.0
Jun 29, 2018
06/18
by
Yanwei Cui; Laetitia Chapel; Sébastien Lefèvre
texts
eye 2
favorite 0
comment 0
Tree kernels have demonstrated their ability to deal with hierarchical data, as the intrinsic tree structure often plays a discriminative role. While such kernels have been successfully applied to various domains such as nature language processing and bioinformatics, they mostly concentrate on ordered trees and whose nodes are described by symbolic data. Meanwhile, hierarchical representations have gained increasing interest to describe image content. This is particularly true in remote...
Topics: Computer Vision and Pattern Recognition, Computing Research Repository
Source: http://arxiv.org/abs/1604.01787
4
4.0
Jun 30, 2018
06/18
by
Chaogui Kang; Yu Liu; Lun Wu
texts
eye 4
favorite 0
comment 0
Travel activities have been widely applied to quantify spatial interactions between places, regions and nations. In this paper, we model the spatial connectivities between 652 Traffic Analysis Zones (TAZs) in Beijing by a taxi OD dataset. First, we unveil the gravitational structure of intra-urban spatial connectivities of Beijing. On overall, the inter-TAZ interactions are well governed by the Gravity Model $G_{ij} = {\lambda}p_{i}p_{j}/d_{ij}$, where $p_{i}$, $p_{j}$ are degrees of TAZ $i$,...
Topics: Physics, Physics and Society, Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1407.4194
3
3.0
Jun 30, 2018
06/18
by
Ling Feng; Yanqing Hu; Baowen Li; H. Eugene Stanley; Shlomo Havlin; Lidia A. Braunstein
texts
eye 3
favorite 0
comment 0
Although the many forms of modern social media have become major channels for the dissemination of information, they are becoming overloaded because of the rapidly-expanding number of information feeds. We analyze the expanding user-generated content in Sina Weibo, the largest micro-blog site in China, and find evidence that popular messages often follow a mechanism that differs from that found in the spread of disease, in contrast to common believe. In this mechanism, an individual with more...
Topics: Physics, Physics and Society, Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1410.1668
3
3.0
Jun 30, 2018
06/18
by
J. -F. Mercure; A. Lam
texts
eye 3
favorite 0
comment 0
The effectiveness of fiscal policy to influence vehicle purchases for emissions reductions in private passenger road transport depends on its ability to incentivise consumers to make choices oriented towards lower emissions vehicles. However, car purchase choices are known to be strongly socially determined, and this sector is highly diverse due to significant socio-economic differences between consumer groups. Here, we present a comprehensive dataset and analysis of the structure of the 2012...
Topics: Physics, Physics and Society, Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1411.2384
2
2.0
Jun 30, 2018
06/18
by
Peng Wang; Baowen Xu; Yurong Wu; Xiaoyu Zhou
texts
eye 2
favorite 0
comment 0
In social networks, link prediction predicts missing links in current networks and new or dissolution links in future networks, is important for mining and analyzing the evolution of social networks. In the past decade, many works have been done about the link prediction in social networks. The goal of this paper is to comprehensively review, analyze and discuss the state-of-the-art of the link prediction in social networks. A systematical category for link prediction techniques and problems is...
Topics: Physics, Computing Research Repository, Physics and Society, Social and Information Networks
Source: http://arxiv.org/abs/1411.5118
3
3.0
Jun 30, 2018
06/18
by
Lei Shi; Hanghang Tong; Jie Tang; Chuang Lin
texts
eye 3
favorite 0
comment 0
Visually mining a large influence graph is appealing yet challenging. People are amazed by pictures of newscasting graph on Twitter, engaged by hidden citation networks in academics, nevertheless often troubled by the unpleasant readability of the underlying visualization. Existing summarization methods enhance the graph visualization with blocked views, but have adverse effect on the latent influence structure. How can we visually summarize a large graph to maximize influence flows? In...
Topics: Human-Computer Interaction, Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1408.2401
3
3.0
Jun 30, 2018
06/18
by
Tsirizo Rabenoro; Jérôme Lacaille; Marie Cottrell; Fabrice Rossi
texts
eye 3
favorite 0
comment 0
Automatic anomaly detection is a major issue in various areas. Beyond mere detection, the identification of the source of the problem that produced the anomaly is also essential. This is particularly the case in aircraft engine health monitoring where detecting early signs of failure (anomalies) and helping the engine owner to implement efficiently the adapted maintenance operations (fixing the source of the anomaly) are of crucial importance to reduce the costs attached to unscheduled...
Topics: Machine Learning, Computing Research Repository, Statistics, Learning
Source: http://arxiv.org/abs/1409.4747
2
2.0
Jun 29, 2018
06/18
by
Qing Wang; Jian Gao; Tao Zhou; Zheng Hu; Hui Tian
texts
eye 2
favorite 0
comment 0
With the help of information and communication technologies, studies on the overall social networks have been extensively reported recently. However, investigations on the directed Ego Communication Networks (ECNs) remain insufficient, where an ECN stands for a sub network composed of a centralized individual and his/her direct contacts. In this paper, the directed ECNs are built on the Call Detail Records (CDRs), which cover more than 7 million people of a provincial capital city in China for...
Topics: Social and Information Networks, Computing Research Repository, Physics, Physics and Society
Source: http://arxiv.org/abs/1606.03911
3
3.0
Jun 29, 2018
06/18
by
Katsuyuki Haneda; Lei Tian; Yi Zheng; Henrik Asplund; Jian Li; Yi Wang; David Steer; Clara Li; Tommaso Balercia; Sunguk Lee; YoungSuk Kim; Amitava Ghosh; Timothy Thomas; Takehiro Nakamura; Yuichi Kakishima; Tetsuro Imai; Haralabos Papadopoulas; Theodore S. Rappaport; George R. MacCartney; Mathew K. Samimi; Shu Sun; Ozge Koymen; Sooyoung Hur; Jeongho Park; Charlie Zhang; Evangelos Mellios; Andreas F. Molisch; Saeed S. Ghassamzadah; Arun Ghosh
texts
eye 3
favorite 0
comment 0
For the development of new 5G systems to operate in bands up to 100 GHz, there is a need for accurate radio propagation models at these bands that currently are not addressed by existing channel models developed for bands below 6 GHz. This document presents a preliminary overview of 5G channel models for bands up to 100 GHz. These have been derived based on extensive measurement and ray tracing results across a multitude of frequencies from 6 GHz to 100 GHz, and this document describes an...
Topics: Information Theory, Computing Research Repository, Mathematics
Source: http://arxiv.org/abs/1602.07533
156
156
texts
eye 156
favorite 0
comment 0
3
3.0
Jun 30, 2018
06/18
by
Junhui Shen; Peiyan Zhu; Rui Fan; Wei Tan
texts
eye 3
favorite 0
comment 0
With the acceptance of Western culture and science, Traditional Chinese Medicine (TCM) has become a controversial issue in China. So, it's important to study the public's sentiment and opinion on TCM. The rapid development of online social network, such as twitter, make it convenient and efficient to sample hundreds of millions of people for the aforementioned sentiment study. To the best of our knowledge, the present work is the first attempt that applies sentiment analysis to the domain of...
Topics: Computing Research Repository, Computation and Language, Social and Information Networks
Source: http://arxiv.org/abs/1410.3460
4
4.0
Jun 30, 2018
06/18
by
Ark Fangzhou Zhang; Danielle Livneh; Ceren Budak; Lionel P. Robert; Daniel M. Romero
texts
eye 4
favorite 0
comment 0
Collaborative crowdsourcing has become a popular approach to organizing work across the globe. Being global also means being vulnerable to shocks -- unforeseen events that disrupt crowds -- that originate from any country. In this study, we examine changes in collaborative behavior of editors of Chinese Wikipedia that arise due to the 2005 government censor- ship in mainland China. Using the exogenous variation in the fraction of editors blocked across different articles due to the censorship,...
Topics: Computing Research Repository, Social and Information Networks
Source: http://arxiv.org/abs/1704.00412
35
35
audio
eye 35
favorite 0
comment 0
More $ for Nukes? The Nation's top nuclear weapons administrator wants additional money from Congress to develop more advanced systems. Kelly Giddens has more from D.C. Lousiana Court Says $ Considered in Poor's Prosecutions The Louisiana state Supreme Court says that prosecutions of the poor can be halted until there is enough money to pay public defenders. Mabli Ajan reports from La Place, Louisiana. Feminist Party In Sweden A new party calling itself the Feminist Initiative was introduced in...
Topics: NSA, attorney general, california, china, death penalty, elections, iran, louisiana, nuclear...
28
28
May 14, 2018
05/18
by
Bielawski, Larry;Boyle, Jim
texts
eye 28
favorite 0
comment 0
xiii, 332 pages : 24 cm
Topics: Document imaging systems, Business records -- Management -- Data processing, Information storage...
5
5.0
Jun 30, 2018
06/18
by
Leihan Zhang; Jichang Zhao; Ke Xu
texts
eye 5
favorite 0
comment 0
Trends in online social media always reflect the collective attention of a vast number of individuals across the network. For example, Internet slang words can be ubiquitous because of social memes and online contagions in an extremely short period. From Weibo, a Twitter-like service in China, we find that the adoption of popular Internet slang words experiences two peaks in its temporal evolution, in which the former is relatively much lower than the latter. This interesting phenomenon in fact...
Topics: Physics, Computers and Society, Computing Research Repository, Physics and Society, Social and...
Source: http://arxiv.org/abs/1409.0210
3
3.0
Aug 27, 2018
08/18
by
None
texts
eye 3
favorite 0
comment 0
1 online resource (xiv, 175 pages) :
Topics: Radioactive waste disposal -- Social aspects -- United States, Radioactive waste disposal --...
The United States expends great effort to account for members of the Armed Forces who were lost while serving the Nation. No other country has done as much. The Department of Defense is responsible for personnel recovery and accounting. Today, the Defense Prisoner of War/Missing Personnel Office (DPMO) develops and oversees national policies that facilitate this overall endeavor. In the aftermath of the Vietnam War, various commissions pursued information on the fate of missing service members....
Topics: DTIC Archive, Erstfeld, Thomas E, NATIONAL DEFENSE UNIV WASHINGTON DC CENTER FOR...
20
20
Jun 19, 2017
06/17
by
apache
software
eye 20
favorite 0
comment 0
Mirror of Apache Geode Overview Main Concepts and Components Location of Directions for Building from Source Geode in 5 minutes Application Development Documentation wiki Continuous Integration Overview [Apache Geode] (http://geode.apache.org/) is a data management platform that provides real-time, consistent access to data-intensive applications throughout widely distributed cloud architectures. Apache Geode pools memory, CPU, network resources, and optionally local disk across multiple...
Topics: GitHub, code, software, git
9
9.0
Jul 20, 2019
07/19
by
grpc
software
eye 9
favorite 0
comment 0
The Go language implementation of gRPC. HTTP/2 based RPC gRPC-Go The Go implementation of gRPC : A high performance, opensource, general RPC framework that puts mobile and HTTP/2 first. For moreinformation see the gRPC Quick Start:Go guide. Installation To install this package, you need to install Go and setup your Go workspace onyour computer. The simplest way to install the library is to run: $ go get -u google.golang.org/grpc With Go module support (Go 1.11+), simply import...
Topics: GitHub, code, software, git
11
11
Dec 13, 2020
12/20
by
microsoft
software
eye 11
favorite 0
comment 0
Qlib is an AI-oriented quantitative investment platform, which aims to realize the potential, empower the research, and create the value of AI technologies in quantitative investment. With Qlib, you can easily try your ideas to create better Quant investment strategies. Qlib is an AI-oriented quantitative investment platform, which aims to realize the potential, empower the research, and create the value of AI technologies in quantitative investment. It contains the full ML pipeline of data...
Topics: GitHub, code, software, git
14
14
Feb 27, 2020
02/20
by
vuejs
software
eye 14
favorite 0
comment 0
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web. Supporting Vue.js Vue.js is an MIT-licensed open source project with its ongoing development made possible entirely by the support of these awesome backers . If you'd like to join them, please consider: Become a backer or sponsor on Patreon . Become a backer or sponsor on Open Collective . One-time donation via PayPal or crypto-currencies. What's the difference between Patreon and...
Topics: GitHub, code, software, git
11
11
Jul 14, 2019
07/19
by
vuejs
software
eye 11
favorite 0
comment 0
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web. Supporting Vue.js Vue.js is an MIT-licensed open source project with its ongoing development made possible entirely by the support of these awesome backers . If you'd like to join them, please consider: Become a backer or sponsor on Patreon . Become a backer or sponsor on Open Collective . One-time donation via PayPal or crypto-currencies. What's the difference between Patreon and...
Topics: GitHub, code, software, git
512
512
Aug 24, 2008
08/08
by
Karl Friedrich August Gützlaff, Charles Gutzlaff
texts
eye 512
favorite 0
comment 0
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Source: http://books.google.com/books?id=yU4NAAAAYAAJ&oe=UTF-8
171
171
Jan 25, 2018
01/18
by
Peter Serwylo
movies
eye 171
favorite 1
comment 0
Peter Serwylo http://lca2018.linux.org.au/schedule/presentation/57/ While smartphones have been heralded as the coming of the next generation of communication and collaboration, they are a step backwards when it comes to personal security, anonymity and privacy. Most app stores encroach on users freedoms by closely monitoring and profiling how people use their devices. They reject apps which do not align with their terms of service. They are also unavailable in some of the worlds biggest...
Topics: lca, lca2018, #linux.conf.au#linux#foss#opensource, PeterSerwylo